CVE-2025-39371: CWE-352 Cross-Site Request Forgery (CSRF) in Sanjeev Mohindra Author Box Plugin With Different Description
Cross-Site Request Forgery (CSRF) vulnerability in Sanjeev Mohindra Author Box Plugin With Different Description allows Cross Site Request Forgery.This issue affects Author Box Plugin With Different Description: from n/a through 1.3.5.
AI Analysis
Technical Summary
CVE-2025-39371 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the 'Author Box Plugin With Different Description' developed by Sanjeev Mohindra. This vulnerability affects versions up to 1.3.5 of the plugin. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application in which the user is currently authenticated. In this case, the attacker could potentially cause the plugin to perform unintended actions on behalf of the user without their consent. The vulnerability does not impact confidentiality or availability directly but can lead to integrity issues by enabling unauthorized changes through forged requests. The CVSS 3.1 base score is 4.3 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability is categorized under CWE-352, which is a well-known class of web security issues related to CSRF attacks. The plugin is typically used in WordPress environments to display author information, and its compromise could allow attackers to manipulate author-related settings or content via CSRF attacks.
Potential Impact
For European organizations using WordPress websites with the affected 'Author Box Plugin With Different Description,' this vulnerability could allow attackers to perform unauthorized actions that alter author information or plugin settings without the user's knowledge. While the direct impact on confidentiality and availability is minimal, the integrity of website content or configuration could be compromised, potentially undermining trust in the website's authenticity or leading to misinformation. This could be particularly impactful for media companies, bloggers, or organizations relying on author credibility. Additionally, if combined with other vulnerabilities or social engineering, it could be a stepping stone for more complex attacks. Given the medium severity and requirement for user interaction, the risk is moderate but should not be overlooked, especially for high-profile or public-facing sites in Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and update the 'Author Box Plugin With Different Description' to the latest version once a patch is released by the vendor. 2) Implement anti-CSRF tokens in all forms and state-changing requests within the plugin to ensure requests are legitimate. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting this plugin. 4) Educate users and administrators about the risks of clicking on suspicious links or performing actions from untrusted sources while authenticated. 5) Regularly audit and monitor website logs for unusual POST requests or changes to author box settings that could indicate exploitation attempts. 6) Consider temporarily disabling or replacing the plugin with a more secure alternative if a patch is not available promptly. 7) Ensure that WordPress core and all plugins are kept up to date to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-39371: CWE-352 Cross-Site Request Forgery (CSRF) in Sanjeev Mohindra Author Box Plugin With Different Description
Description
Cross-Site Request Forgery (CSRF) vulnerability in Sanjeev Mohindra Author Box Plugin With Different Description allows Cross Site Request Forgery.This issue affects Author Box Plugin With Different Description: from n/a through 1.3.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-39371 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the 'Author Box Plugin With Different Description' developed by Sanjeev Mohindra. This vulnerability affects versions up to 1.3.5 of the plugin. CSRF vulnerabilities allow an attacker to trick an authenticated user into submitting a forged HTTP request to a web application in which the user is currently authenticated. In this case, the attacker could potentially cause the plugin to perform unintended actions on behalf of the user without their consent. The vulnerability does not impact confidentiality or availability directly but can lead to integrity issues by enabling unauthorized changes through forged requests. The CVSS 3.1 base score is 4.3 (medium severity), with the vector indicating that the attack can be performed remotely (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability is categorized under CWE-352, which is a well-known class of web security issues related to CSRF attacks. The plugin is typically used in WordPress environments to display author information, and its compromise could allow attackers to manipulate author-related settings or content via CSRF attacks.
Potential Impact
For European organizations using WordPress websites with the affected 'Author Box Plugin With Different Description,' this vulnerability could allow attackers to perform unauthorized actions that alter author information or plugin settings without the user's knowledge. While the direct impact on confidentiality and availability is minimal, the integrity of website content or configuration could be compromised, potentially undermining trust in the website's authenticity or leading to misinformation. This could be particularly impactful for media companies, bloggers, or organizations relying on author credibility. Additionally, if combined with other vulnerabilities or social engineering, it could be a stepping stone for more complex attacks. Given the medium severity and requirement for user interaction, the risk is moderate but should not be overlooked, especially for high-profile or public-facing sites in Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately review and update the 'Author Box Plugin With Different Description' to the latest version once a patch is released by the vendor. 2) Implement anti-CSRF tokens in all forms and state-changing requests within the plugin to ensure requests are legitimate. 3) Employ Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting this plugin. 4) Educate users and administrators about the risks of clicking on suspicious links or performing actions from untrusted sources while authenticated. 5) Regularly audit and monitor website logs for unusual POST requests or changes to author box settings that could indicate exploitation attempts. 6) Consider temporarily disabling or replacing the plugin with a more secure alternative if a patch is not available promptly. 7) Ensure that WordPress core and all plugins are kept up to date to reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-04-16T06:22:29.272Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb55e
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:17:11 PM
Last updated: 1/7/2026, 5:26:44 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.